International audience"Internet of Services" (IoS) is a vision of the Internet of the Future where applications are built by combining services provided by a variety of service providers over the network. They are deployed as needed and consumed at run-time in a demand-driven and flexible way. Model-based testing is one method for testing security of applications but it needs formal models and most of the time service providers are not able to provide them. For that, model inference methods adapted to security testing can be used. This document tries to give some directions in order to combine enhanced model inference and model testing to ensure security of services automatically
Les approches de tests basées sur les modèles (MBT) ont su montrer leur efficacité pour le test logi...
The Internet today provides the environment for novel applications and processes which may evolve w...
With the rapid developments of Web applications, more security issues such as web vulnerabilities, w...
International audienceIn the Internet of services (IoS), web applications are the most common way to...
International audienceThe SPaCIoS project has as goal the validation and testing of security propert...
Abstract—In the “Internet of Services ” (IoS) vision of the Internet, applications are developed as ...
Abstract—Model checking and security testing are two ver-ification techniques available to help find...
The process of testing vulnerabilities of mobile software applications has been analysed. This is du...
Security testing aims at validating software system requirements related to security properties like...
The Internet today provides the environment for novel applications and processes which may evolve wa...
We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the co...
International audienceThe Internet of Things (IoT) is a broad concept comprising a wide ecosystem of...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
The security of protocol implementation is important and hard to be verified. Since the penetration ...
In the last decade, model-based testing (MBT) approaches have shown their efficiency in the software...
Les approches de tests basées sur les modèles (MBT) ont su montrer leur efficacité pour le test logi...
The Internet today provides the environment for novel applications and processes which may evolve w...
With the rapid developments of Web applications, more security issues such as web vulnerabilities, w...
International audienceIn the Internet of services (IoS), web applications are the most common way to...
International audienceThe SPaCIoS project has as goal the validation and testing of security propert...
Abstract—In the “Internet of Services ” (IoS) vision of the Internet, applications are developed as ...
Abstract—Model checking and security testing are two ver-ification techniques available to help find...
The process of testing vulnerabilities of mobile software applications has been analysed. This is du...
Security testing aims at validating software system requirements related to security properties like...
The Internet today provides the environment for novel applications and processes which may evolve wa...
We propose in this chapter a Model-based Security Toolkit (SecKit) and methodology to address the co...
International audienceThe Internet of Things (IoT) is a broad concept comprising a wide ecosystem of...
AbstractDesigning and implementing security-critical systems correctly is very difficult. In practic...
The security of protocol implementation is important and hard to be verified. Since the penetration ...
In the last decade, model-based testing (MBT) approaches have shown their efficiency in the software...
Les approches de tests basées sur les modèles (MBT) ont su montrer leur efficacité pour le test logi...
The Internet today provides the environment for novel applications and processes which may evolve w...
With the rapid developments of Web applications, more security issues such as web vulnerabilities, w...